Getting started
Note
The Amazon Q Developer operational investigations feature is in preview release and is subject to change. It is currently available only in the US East (N. Virginia) Region.
To set up Amazon Q Developer operational investigations, you create an investigation group. You can also see a sample investigation to get an overall idea of how they work.
See a sample investigation
Note
The Amazon Q Developer operational investigations feature is in preview release and is subject to change. It is currently available only in the US East (N. Virginia) Region.
If you'd like to see the Amazon Q Developer operational investigations feature in action before you configure it for your account, you can walk through a sample investigation. The sample investigation doesn't use your data and doesn't make data calls or start API operations in your account.
To view the sample investigation
Open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/
. In the left navigation pane, choose AI Operations, Overview.
Choose Try a sample investigation.
The console displays the sample investigation, with suggestions and findings in the right pane. In each popup, choose Next to advance to the next part of the sample walkthrough.
Set up operational investigations
Note
The Amazon Q Developer operational investigations feature is in preview release and is subject to change. It is currently available only in the US East (N. Virginia) Region.
To set up Amazon Q Developer operational investigations in your account, you create an investigation group. Creating an investigation group is a one-time setup task. Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:
-
Who can access the investigations
-
Whether investigation data is encrypted with a customer managed AWS Key Management Service key.
-
How long investigations and their data are retained by default.
Currently, you can have one investigation group per account. Each investigation in your account will be part of this investigation group.
To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the AIOpsConsoleAdminPolicy or the AdministratorAccess IAM policy attached, or to an account that has similar permissions.
Note
To be able to choose the recommended option of creating a new IAM role for Amazon Q Developer operational investigations, you must be signed in to an IAM principal
that has the iam:CreateRole
, iam:AttachRolePolicy
, and iam:PutRolePolicy
permissions.
Important
Amazon Q Developer operational investigations uses cross region inference to distribute traffic across different AWS Regions in the United States. For more information see Cross region inference in Amazon Q Developer in the Amazon Q Developer user guide.
To create an investigation group and enable Amazon Q Developer operational investigations in your account
Open the CloudWatch console at https://console.aws.amazon.com/cloudwatch/
. -
In the left navigation pane, choose AI Operations, Investigations.
-
Choose Configure for this account.
-
Enter a name for the investigation group.
-
Optionally change the retention period for investigations. For more information about what the retention period governs, see Operational investigation data retention.
-
(Optional) To encrypt your investigation data with a customer managed AWS KMS key, choose Customize encryption settings and follow the steps to create or specify a key to use. For more information, see Encryption of investigation data.
-
If you haven't already done so, use the IAM console to provision access for your users to be able to see and manage investigations. We provide IAM roles for administrators, operators, and viewers. For more information, see User permissions.
-
(Optional) You can have investigations attribute investigation actions such as adding a suggestion to the Feed to individual users. You do this by integrating Amazon Q Developer operational investigations with IAM Identity Center. To do so, validate that you meet the pre-requisites and then choose to allow the creation of a managed IAM Identity Center application for Amazon Q Developer operational investigations. For more information about the pre-requisites, see AWS IAM Identity Center.
-
For Amazon Q Developer permissions, choose one of the following. For more information about these options, see How to control what data Amazon Q Developer has access to during investigations.
-
The recommended option is to choose Auto-create a new role with default investigation permissions. If you choose this option, the assistant is granted the AIOpsAssistantPolicy IAM policy. For more information about the contents of this policy, see IAM policy for Amazon Q Developer operational investigations (AIOpsAssistantPolicy).
Note
To be able to choose this option, you must be signed in to an IAM principal that has the
iam:CreateRole
,iam:AttachRolePolicy
, andiam:PutRolePolicy
permissions. -
Choose Create a new role from AWS policy templates to customize the permissions that Amazon Q Developer will have during investigations. If you choose this option, you must be sure to scope down the policy to only the permissions that you want Amazon Q Developer to have during investigations.
-
Choose Assign an existing role if you already have a role with the permissions that you want to use.
-
-
(Optional) For Enhanced integrations, choose to allow Amazon Q Developer access to additional services in your system, to enable it to gather more data and be more useful.
-
In the Tags for application boundary detection section, enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q Developer narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q Developer can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q Developer will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q Developer in these cases.
You don't need to enter tags created by myApplications or AWS CloudFormation, because Amazon Q Developer can automatically detect those tags.
-
CloudTrail records events about changes in your system including deployment events. These events can often be useful to Amazon Q Developer to create hypotheses about root causes of issues in your system. In the CloudTrail for change event detection section, you can do one or both of the following.
-
Give Amazon Q Developer some access to the events logged by AWS CloudTrail by enabling Allow the assistant access to CloudTrail change events through the CloudTrail Event history. For more information, see Working with CloudTrail Event history.
-
Give Amazon Q Developer access to additional CloudTrail data by entering one or more CloudTrail trails, which are records of activities within your AWS account. This is supported only for trails that are sent to log groups in CloudWatch Logs. For more information about trails see Working with CloudTrail trails.
-
-
The X-Ray for topology mapping and Application Signals for health assessment sections point out other AWS services that can help Amazon Q Developer find information. If you have deployed them and you have granted the AIOpsAssistantPolicy IAM policy to Amazon Q Developer, it will be able to access X-Ray and Application Signals telemetry.
For more information about how these services help Amazon Q Developer, see X-Ray and CloudWatch Application Signals
-
-
(Optional) You can integrate Amazon Q Developer operational investigations with a chat channel using AWS Chatbot. This makes it possible to receive notifications about an investigation through the chat channel. Amazon Q Developer operational investigations and AWS Chatbot support chat channels in the following applications:
-
Slack
-
Microsoft Teams
If you want to integrate with a chat channel, we recommend that you complete some other steps before performing this step in the create an investigation group process. For more information, see Integration with third-party chat systems.
To then perform the steps here to integrate with a chat channel in AWS Chatbot, do the following:
-
In the Chat client integration section, choose Select SNS topic.
-
Select the SNS topic to use for sending notifications about your investigations.
-
-
Choose Complete setup.